-
3
-
-
85045893940
-
Moderately hard, memory-bound functions
-
Abadi, M., Burrow, M., Manasse, M., Wobber, T.: Moderately hard, memory-bound functions. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium (2003)
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
-
-
Abadi, M.1
Burrow, M.2
Manasse, M.3
Wobber, T.4
-
4
-
-
33751110528
-
Taming ip packet flooding attacks
-
In: November
-
Adkins, D., Lakshminarayanan, K., Perrig, A., Stoica, I.: Taming ip packet flooding attacks. In: Proceedings of Workshop on Hot Topics in Networks (HotNets-II). November (2003)
-
(2003)
Proceedings of Workshop on Hot Topics in Networks (HotNets-II)
-
-
Adkins, D.1
Lakshminarayanan, K.2
Perrig, A.3
Stoica, I.4
-
6
-
-
35048820228
-
Mayday: Distributed filtering for internet services
-
Andersen, D.: Mayday: Distributed filtering for internet services. In: Proceeding of USITS (2003)
-
(2003)
Proceeding of USITS
-
-
Andersen, D.1
-
9
-
-
0038684360
-
Dos-resistant authentication with client puzzles
-
In: LNCS. Springer, Heidelberg
-
Aura, T., Nikander, P., Leiwo, J.: Dos-resistant authentication with client puzzles. In: Proceedings of the Cambridge Security Protocols Worshop 2000. LNCS. Springer, Heidelberg (2000)
-
(2000)
Proceedings of the Cambridge Security Protocols Worshop 2000
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
10
-
-
47649122501
-
-
Internet Assigned Numbers Authority. ICMP type numbers. November
-
Internet Assigned Numbers Authority. ICMP type numbers. November, 2003. http://www.iana.org/assignments/icmp-parameters
-
(2003)
-
-
-
12
-
-
0038650772
-
Defending against sequence number attacks
-
In: May
-
Bellovin, S.: Defending against sequence number attacks. In: RFC 1948, May 1996
-
(1996)
RFC 1948
-
-
Bellovin, S.1
-
13
-
-
8344278876
-
The ICMP traceback messages
-
In: December ftp://ftp.ietf.org/internet-drafts/draft-ietf-itrace-01.txt
-
Bellovin, S., Leech, M., Taylor, T.: The ICMP traceback messages. In: Internet-Draft, draft-ietf-itrace-01.txt, December 1999. ftp:// ftp.ietf.org/internet-drafts/draft-ietf-itrace-01.txt
-
(1999)
Internet-Draft, Draft-ietf-itrace-01.txt
-
-
Bellovin, S.1
Leech, M.2
Taylor, T.3
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom B.H. (1970). Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7): 422-426
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
15
-
-
84974588386
-
Timed commitments (extended abstract)
-
In: Springer, Heidelberg
-
Boneh, D., Naor, M.: Timed commitments (extended abstract). In: Proceedings of Advances in Cryptology - CRYPTO'00. Lecture Notes in Computer Science, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
-
(2000)
Proceedings of Advances in Cryptology - CRYPTO'00. Lecture Notes in Computer Science
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
17
-
-
47649101240
-
-
Caida. Skitter
-
Caida. Skitter. 2003. http://www.caida.org/tools/measurement/
-
(2003)
-
-
-
24
-
-
85006413597
-
Analyzing distributed denial of service attack tools: The shaft case
-
Dietrich, S., Long, N., Dittrich, D.: Analyzing distributed denial of service attack tools: The shaft case. In: Proceedings of 14th Systems Administration Conference, LISA 2000 (2000)
-
(2000)
Proceedings of 14th Systems Administration Conference, LISA 2000
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
26
-
-
84943235829
-
Pricing via processing or combating junk mail
-
In: Brickell, E. (ed.) Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via processing or combating junk mail. In: Brickell, E. (ed.) Proceedings of ADVANCES IN CRYPTOLOGY - CRYPTO 92. Lecture Notes in Computer Science, vol. 1328, pp. 139-147. Springer, Heidelberg (1992)
-
(1992)
Proceedings of ADVANCES IN CRYPTOLOGY - CRYPTO 92. Lecture Notes in Computer Science
, vol.1328
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
32
-
-
0034229418
-
Defeating distributed denial of service attacks
-
Geng X. and Whinston A. (2000). Defeating distributed denial of service attacks. IEEE IT Profes. 2(4): 36-41
-
(2000)
IEEE IT Profes.
, vol.2
, Issue.4
, pp. 36-41
-
-
Geng, X.1
Whinston, A.2
-
35
-
-
0003976889
-
-
October
-
Houle, K., Weaver, G., Long, N., Thomas, R.: Trends in denial of service attack technology. October 2001. http://www.cert.org/archive/pdf/ DoS_trends.pdf
-
(2001)
Trends in Denial of Service Attack Technology
-
-
Houle, K.1
Weaver, G.2
Long, N.3
Thomas, R.4
-
37
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed traffic
-
Jin, C., Wang, A., Shin, K.G.: Hop-count filtering: an effective defense against spoofed traffic. In: Proceedings of ACM CCS (2003)
-
(2003)
Proceedings of ACM CCS
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
38
-
-
84861587712
-
Client puzzle: A cryptographic defense against connection depletion attacks
-
In: Kent, S. (ed.)
-
Juels, A.A Brainard, J.: Client puzzle: a cryptographic defense against connection depletion attacks. In: Kent, S. (ed.) Proceedings of NDSS'99, pp. 151-165 (1999)
-
(1999)
Proceedings of NDSS'99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
40
-
-
3042859154
-
Resisting syn flood dos attacks with a syn cache
-
In: Leffler, S.J. (ed.) USENIX, February 11-14
-
Lemmon, J.: Resisting syn flood dos attacks with a syn cache. In: Leffler, S.J. (ed.) Proceedings of BSDCon 2002. USENIX, 2002, February 11-14
-
(2002)
Proceedings of BSDCon 2002
-
-
Lemmon, J.1
-
42
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan R., Bellovin S., Floyd S., Ioannidis J., Paxson V. and Shenker S. (2002). Controlling high bandwidth aggregates in the network. CCR 32(3): 62-73
-
(2002)
CCR
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
43
-
-
0035075103
-
A cost-based framework for analysis of denial of service networks
-
Meadows and C. (2001). A cost-based framework for analysis of denial of service networks. J. Comput. Secur. 9: 143-164
-
(2001)
J. Comput. Secur.
, vol.9
, pp. 143-164
-
-
Meadows, C.1
-
44
-
-
0017959977
-
Secure communications over insecure channels
-
Merkle R.C. (1978). Secure communications over insecure channels. Commun. ACM 21: 294-299
-
(1978)
Commun. ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
45
-
-
18744376590
-
Using graphic turing tests to counter automated ddos attacks against web servers
-
Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using graphic turing tests to counter automated ddos attacks against web servers. In: Proceedings of ACM CCS (2003)
-
(2003)
Proceedings of ACM CCS
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
47
-
-
47649085814
-
Defensive programming: Using an annotation toolkit to build dos-resistant software
-
In: December
-
Qie, X., Pang, R., Peterson, L.: Defensive programming: Using an annotation toolkit to build dos-resistant software. In: Proceedings of the 5th OSDI Symposium, December 2002
-
(2002)
Proceedings of the 5th OSDI Symposium
-
-
Qie, X.1
Pang, R.2
Peterson, L.3
-
48
-
-
0010602889
-
Time-lock puzzles and timed-release crypto
-
Manuscript, 10 March
-
Rivest, R.L., Shamir, A., Wagner, D.: Time-lock puzzles and timed-release crypto. Manuscript, 10 March 1996
-
(1996)
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.3
-
49
-
-
84964474589
-
Hardware support for a hash-based IP traceback
-
Sanchez, L., Milliken, W.C., Snoeren, A., Tchakountio, F., Jones, C., Kent, S., Partridge, C., Strayer, W.T.: Hardware support for a hash-based IP traceback. In: Proceedings of the DARPA Information Survivability Conference and Exposition II, DISCEX'01 2001.
-
(2001)
Proceedings of the DARPA Information Survivability Conference and Exposition II, DISCEX'01
-
-
Sanchez, L.1
Milliken, W.C.2
Snoeren, A.3
Tchakountio, F.4
Jones, C.5
Kent, S.6
Partridge, C.7
Strayer, W.T.8
-
50
-
-
0001647024
-
Network support for IP traceback
-
In: August
-
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network support for IP traceback. In: Proceedings of ACM SIGCOMM, August 2000
-
(2000)
Proceedings of ACM SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
52
-
-
0001887844
-
Hash-based IP traceback
-
In: August
-
Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Kent, S., Strayer, W.T.: Hash-based IP traceback. In: Proceedings of the ACM SIGCOMM, August 2001
-
(2001)
Proceedings of the ACM SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.T.7
-
53
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
In: April
-
Song, D., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings of IEEE INFOCOMM, April 2001
-
(2001)
Proceedings of IEEE INFOCOMM
-
-
Song, D.1
Perrig, A.2
-
54
-
-
0002709112
-
Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks
-
Stoica, I., Shenker, S., Zhang, H.: Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks. In: Proceedings of ACM SIGCOMM (1998)
-
(1998)
Proceedings of ACM SIGCOMM
-
-
Stoica, I.1
Shenker, S.2
Zhang, H.3
-
57
-
-
14844296912
-
-
June ftp://ftp.internic.net/rfc/rfc1810.txt, ftp://ftp.math.utah.edu/ pub/rfc/rfc1810.txt
-
Touch, J.: RFC 1810: Report on MD5 performance, June 1995. ftp:// ftp.internic.net/rfc/rfc1810.txt, ftp://ftp.math.utah.edu/pub/rfc/ rfc1810.txt
-
(1995)
RFC 1810: Report on MD5 Performance
-
-
Touch, J.1
-
58
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: Using hard ai problems for security. In: Proceedings of Eurocrypt, pp. 294-311 (2003)
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
62
-
-
84954422497
-
Pi: A path identification mechanism to defend against DDoS attacks
-
In: May
-
Yaar, A., Perrig, A., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: IEEE Symposium on Security and Privacy, May 2003. http://www.ece.cmu.edu/~adrian/projects/pi.ps
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|